9/11,Mossad Unit 8200:Israeli Terrorists In Control Of NSA,Internet Financial Espionage Make A Killing

In San Francisco the "secret room" is Room 641A at 611 Folsom Street, the site of a large SBC ... Mossad Unit 8200 Prism Spying Scandal longer summary: The US National Security Agency has an Israeli Mossad cousin or two “wishing” to ...

Suter has been linked to the five Israeli agents, employees of UMS, caught filming ..... fund ($7 billion); the Jews managed to get 97% of the victims' families to take the .... [New Yorker, 10/29/2001] Lewin founded Akamai, a successful computer ...

Before Edward Snowden smashed its digital doors wide open, the National Security Agency was seen as the mysterious keeper of an arsenal of dark-voodoo hacking weapons. Now we know the truth: NSA employees are almost too good at what they do–as are their counterparts at Israel’s elite military signal intelligence group, Unit 8200. Unlike people at most government agencies, NSAers and Unit 8200 alums include world experts in their craft, in this case hacking and defending networks and devices. With data breaches now a daily news item, a stint at either agency has become résumé gold for entrepreneurs. Some agency folks are leaving more out of a moral duty to restore some balance back to the private sector. In the last year ex-NSA founders have snagged $9 million for bug-bounty firm Synack, $2.5 million for attack-detection firm Area 1 Security and $10.3 million for e-mail encryption play Virtru. “I think it’s a direct correlation to Snowden,” says Ted Schlein, a veteran cybersecurity venture investor at Kleiner Perkins Caufield & Byers. The path from spy to startup is also in full swing in Israel, where entrepreneurs envy the earlier success of 8200 alums such as Gil Shwed and Marius Nacht, the billionaire cofounders of Check Point Software, and Nir Zuk, founder of Palo Alto Networks (market value: $6.6 billion). Here are some of the more high-profile defectors and players in the spy-versus-spy game.

full spy gatefold

1. LEV KADYSHEVITCH, Head Of Research, Biocatch
Its algorithms determine the identity of users based on how they interact with apps, exploiting research on human response to certain phenomena, such as the brief disappearance of a mouse cursor. The 8200-alum-packed firm has $14 million in funding.

2. GIORA ENGEL, Cofounder, LightCyber
With his Unit 8200 buddy Michael Mumcuoglu he established LightCyber in 2011 to detect breaches using a network appliance that flags strange-looking traffic. It has raised $12 million to date from VCs and Check Point’s billionaire cofounder Marius Nacht.

3. TED SCHLEIN, Managing Partner, Kleiner Perkins Caufield & Byers
Schlein did not belong to either spy agency but he recognizes their potential. Silicon Valley’s top cybersecurity financier recently backed two NSAer firms: Synack and Area 1 Security. “The portrayal of the NSA doing things that are bad is not making it the hot place to work inside the intelligence community. I think a lot of their creativity is being curtailed,” says Schlein. “As a VC, I think it’s wonderful. As a citizen of the U.S., I’d make a different argument.”

4. LIOR DIV, CEO, CybeReason
The Unit 8200 alum moved his startup from Israel to Boston to tap talent and a bigger market. Its software infers the presence of an attack under way and displays the situation in an easy-to-grasp graphical interface. Div raised $4.6 million earlier this year from Charles River Ventures.

5. JAY KAPLAN and 10. MARK KUHR, Cofounders, Synack
Kaplan, 28, and Kuhr, 30, spent four years in offensive security at NSA’s counterterrorism division, hacking around for weak spots and finding plenty to exploit. They quit early last year and quickly raised $1.5 million to launch Synack, an army of several hundred freelancers who get paid if they find bugs in clients’ codes–except this time the bugs get fixed. “We don’t work for the NSA anymore. We wouldn’t leave a vulnerability or anything like that,” says Kaplan. “But we would turn away China’s elite hacking force as a customer.”

6. ERAN BARAK, CEO and cofounder, Hexadite
Barak was a five-year veteran and officer at Unit 8200 before going into business earlier this year. Hexadite plans to bring automated incident response to the masses. It already has four customers in Israel and the U.S. YL Ventures backed Barak and his colleagues with $2.5 million.

7. OREN FALKOWITZ, Cofounder, Area 1 Security
Falkowitz spent six years at the NSA crunching mountains of data to uncover attacks. He and five colleagues left in 2012 to start Sqrrl, an analytics firm in Boston. He moved to Silicon Valley this year to launch Area 1, which monitors employee clicks and flags any dangerous behavior or deviations. It received $2.5 million in funding in May. “There are lots of mafias out here: PayPal, Palantir. I don’t want to use the word mafia,’ but I want one for NSA grads,” he says. “People who come from there have an innate knowledge that you can’t teach.”

8. ROB SEGER, Cofounder, Morta Security
Seger’s two years in the NSA’s Protocol Exploitation office is not on his LinkedIn profile. He left the agency to consult in 2008 and two years ago started Morta to spot threats already inside a network firewall. “When we told investors we were ex-NSAers interested in going into security, they instantly wanted to give us money,” says Seger. Palo Alto Networks bought the firm this year. “Historically, everyone was fearful of the NSA, but no one actively disliked ex-NSAers. Snowden changed that.”

9. GILI RAANAN, Partner, Sequoia Capital

Raanan, an 8200 alum and VC in Herzliya, Israel, started and sold two security software firms and now funds the 8200 diaspora, with money in Adallom, Mintigo and Seculert. He prizes the talent that the Israel military consistently produces at a young age. “Graduates have the frame of mind that nothing is impossible. It goes beyond the tech, it’s a state of mind for life.”

The Israeli Criminals Behind the NSA Spy ScandalJune 13, 2013At the center of the NSA scandal is a gang of Israeli high-tech criminals which is connected to the false-flag terror attacks of 9-11. These connections underline the involvement of the same Israeli criminals to both 9-11 and the NSA's secret program to collect and store our personal information and conversations, which came about mainly as a consequence of 9-11.Two Israeli companies, Narus and Verint, are involved in the National Security Agency (NSA) spy scandal in which copies of our phone calls and email data are sent to secret rooms at NSA buildings across the country. These Israeli companies are closely connected to Unit 8200, the electronic espionage unit of the Israeli military. (Narus was acquired by Boeing in 2010.)Jacob "Kobi" AlexanderJacob "Kobi" Alexander The founder and former chairman of Verint is wanted by the FBI for a long list of crimes. He is veteran Israeli intelligence officer.Jacob "Kobi" Alexander, the former head of Comverse, the parent company of Verint, is a wanted criminal who has fled U.S. justice to Africa and probably subsequently to Israel. It is important to note that Kobi Alexander and Comverse were closely connected to Odigo, the Israeli messaging system that was used to warn Israelis to stay away from the World Trade Center on 9-11. Furthermore, the NSA has used Israeli encryption software from RSA Security, Inc. since 2006, which means that Israelis hold the encryption keys to the entire NSA computer network. The Israelis obviously have easy access to everything at the NSA.The following video clip is of James Bamford discussing the two Israeli companies, Narus and Verint, who are involved in the massive collection of our telephone and Internet data. Bamford was on "Democracy Now!" on October 14, 2008, discussing the role of these Israeli companies, who are closely tied to Israeli intelligence.To have access to personal phone calls and emails allows Israeli intelligence to blackmail and control people, like General David Petraeus, who was forced to resign from his position as director of the C.I.A. after an extra-marital affair was revealed by unknown agents who had access to his personal email.

James Bamford on Democracy Now! - October 14, 2008Video Link - http://youtu.be/hI_k9Xt00YEBamford wrote an article entitled "Shady Companies With Ties to Israel Wiretap the U.S. for the NSA" for Wired.com in April 2012 in which he discussed the Israeli companies and the criminals who ran them:In addition to constructing the Stellar Wind center, and then running the operation, secretive contractors with questionable histories and little oversight were also used to do the actual bugging of the entire U.S. telecommunications network.According to a former Verizon employee briefed on the program, Verint, owned by Comverse Technology, taps the communication lines at Verizon, which I first reported in my book The Shadow Factory in 2008. Verint did not return a call seeking comment, while Verizon said it does not comment on such matters.At AT&T the wiretapping rooms are powered by software and hardware from Narus, now owned by Boeing, a discovery made by AT&T whistleblower Mark Klein in 2004. Narus did not return a call seeking comment.What is especially troubling is that both companies have had extensive ties to Israel, as well as links to that country’s intelligence service, a country with a long and aggressive history of spying on the U.S.In fact, according to Binney, the advanced analytical and data mining software the NSA had developed for both its worldwide and international eavesdropping operations was secretly passed to Israel by a mid-level employee, apparently with close connections to the country. The employee, a technical director in the Operations Directorate, “who was a very strong supporter of Israel,” said Binney, “gave, unbeknownst to us, he gave the software that we had, doing these fast rates, to the Israelis.”Several of the top people involved in these Israeli wiretapping companies are if fact criminals who are currently wanted for serious crimes committed in the United States, as Bamford explains in the 2012 article:Like Narus, Verint was founded in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’aretz in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.”Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties.When asked about these contractors, the NSA declined to “verify the allegations made.”Kobi Alexander is also closely connected to the 9-11 criminal atrocity. Alexander and Comverse are connected to the Israeli Odigo messaging company through which warnings were sent to the Israelis who were expected to be at work at the World Trade Center on 9-11. As I explained in an article entitled "Why was Kobi Alexander Allowed to Flee? The Israeli Fugitive, Odigo, and the Forewarning of 9/11" in August 2006:The case of the Israeli criminal Kobi Alexander is like the proverbial "tip of the iceberg." While Alexander's crimes, through which he became immensely wealthy, are now evident, they are but a very small piece of a much larger Zionist criminal network – connected to the 9/11 terror attacks – which remains hidden beneath the surface. Alexander, former head of the Israel-based Comverse Technology, was, until his crimes were discovered, one of the highest paid executives in the United States.In the year 2000, for example, he reportedly earned some $102.5 million, with $93 million coming from the "exercise of options." We now know that most of Alexander's money was made through the fraudulent "exercise of options."Comverse Technology, the U.S.-based "parent company" of an older and much bigger Israel-based company with the same name, is the owner of the Verint, Ulticom, Starhome, Mercom and Startel companies. The key positions in these companies are all held by Israeli nationals.Alexander, was recently allowed to flee the United States after he and two other former Comverse executives were charged with securities, mail and wire fraud by U.S. prosecutors in Brooklyn, New York. A warrant has been issued for his arrest...While Alexander is obviously connected with Israel's military intelligence apparatus and George Soros through the mutually owned investment fund ComSor, what is not widely reported is his company's close links with Odigo, the Israeli-run instant messaging company that received – and conveyed – urgent warning messages about the imminent terror attacks on the World Trade Center, several hours before the first plane hit...Shortly after 9-11, Odigo was completely taken over by Comverse Technology, which had been part owner of Odigo since early 2000, if not earlier. Shortly after 9/11, five executives from Comverse were reported to have profited by more than $267 million from "insider trading."Avner Ronen, the "founder" of Odigo, was Vice President of Business Development of Comverse Technology in October 2005. This indicates that Ronen and Alexander, both Israeli military officers with computer backgrounds, have been close business partners since early 2000.Sources and Recommended Reading:"Israelis Hold Keys to NSA/US Military Computer Networks," by Christopher Bollyn, June 16, 2006, also published as "Israeli Code on U.S. Government Computers" in Solving 9-11: The Original Articles, p. 157http://rense.com/general72/sisi.htm"Narus knows what you are doing on the network" by Om Malik, Forbes, August 11, 1999http://www.forbes.com/1999/08/11/feat.html"Shady Companies With Ties to Israel Wiretap the U.S. for the NSA" by James Bamford, Wired.com, April 3, 2012http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/all/"Why was Kobi Alexander Allowed to Flee? The Israeli Fugitive, Odigo, and the Forewarning of 9/11" by Christopher Bollyn, August 24, 2006, also published as "The Israeli Fugitive and the Forewarning of 9-11" in Solving 9-11: The Original Articles, p. 162 http://www.bollyn.com/why-was-kobi-alexander-allowed-to-flee/ - See more at: http://www.bollyn.com/the-israeli-criminals-behind-the-nsa-spy-scandal/#sthash.2UCA1QNG.dpuf